Professional Documents
Culture Documents
ARTICLE
HOW EMPLOYERS CAN PROTECT THEMSELVES FROM
LIABILITY FOR EMPLOYEES’ MISUSE OF COMPUTER,
INTERNET, AND E-MAIL SYSTEMS IN THE WORKPLACE
*
Louis Papa, J.D., Brooklyn Law School; M.B.A. Computer Information Systems, Baruch
College; B.A., Spanish/Political Science, State University of New York at Buffalo. Mr. Papa
is licensed to practice law in New York, New Jersey and Washington, D.C. Since April
1993, he has managed his own law practice. He currently specializes in Civil Litigation on
behalf of Insurance Companies and engages in transactional work in the Entertainment field.
Mr. Papa has approximately thirteen years of teaching experience. He has been teaching at
Hofstra University since the fall of 1998 and is currently an Assistant Law Professor in the
Zarb School of Business teaching undergraduate and M.B.A. law classes. He has published
articles in numerous fields and was recently cited by the ninth circuit Court of Appeals. He
also had a case that he successfully defended and was reported in the Appellate Division,
2nd Department and was denied leave by the New York State Court of Appeals. Another
successful case was reported in the New York Law Journal. Professor Papa continues to
lecture on behalf of Corporations and at various conferences throughout the continental
United States.
Stuart L. Bass, J.D., M.P.A. Professor Bass is an Associate Professor of Legal Studies at
the Frank G. Zarb School of Business at Hofstra University. Professor Bass teaches a full
range of business law courses including labor and employment and dispute resolution.
Professor Bass has authored articles in leading law reviews and journals on legal ethics,
employment discrimination, arbitration and statutory discrimination claims and securities
regulations. Professor Bass serves as a mediator and arbitrator on several regional and
national panels including the NYS Public Employment Relations Board, the NYS
Employment Relations Board, NASD Regulations, Inc., the Federal Mediation and
Conciliation Service and numerous state and local law enforcement panels.
The authors wish to gratefully acknowledge Brad Smith, a third year law student and
editor-in-chief of the Journal of International Business & Law at the Hofstra University
School of Law, for his able and outstanding research, his time, dedication and assistance in
the preparation and editing of this article. We also wish to express our thanks and
appreciation to Brett Millman, M.B.A. candidate, May, 2004 for his research and support in
the development of the article.
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
TABLE OF CONTENTS
I.INTRODUCTION ...................................................................................................
II.COMPUTER USE AS SEXUAL HARASSMENT ......................................................
III.DOCTRINES OF RESPONDEAT SUPERIOR AND NEGLIGENT RETENTION............
IV.CASES INVOLVING EMPLOYER LIABILITY, INTERNET USE, AND RIGHT
TO PRIVACY ...............................................................................................
V.EXAMPLE OF INTERNET USE AGREEMENT AND OTHER SUGGESTIONS TO
REDUCE EMPLOYER LIABILITY .................................................................
VI.CONCLUSION ...................................................................................................
I. INTRODUCTION
In the workplace today, the use of computers and computer-related
technology, such as the Internet and e-mail, continues to grow at a tremendous
rate. Numerous employees in America and throughout the world use
computers and related technologies. Not only do these computers have
Internet access and numerous programs, but their use is accompanied by a
great deal of responsibility. The amount of illegal activities that employees
can perform from their computers has dramatically increased over recent years.
Using their computers, employees can send threatening or sexually harassing
e-mails from their workplace, copy and distribute confidential information,
gain unauthorized access to others’ computers and download and distribute
illegal pornography.1 Therefore, employers must protect themselves from the
threat of liability by creating and requiring their employees to sign electronic
equipment policy statements. Employees will waive their right of privacy and
allow employers to monitor the use of their computers.
This Article advocates that employers create electronic equipment policy
statements in order to significantly limit their liability from employees’ misuse
of computer systems. Part II discusses how computers, the Internet, and e-mail
are all utilized by employees at a growing rate to participate in wrongful or
illegal acts within the workplace. Part III discusses the theories of respondeat
superior and negligent retention, where employers could be held both civilly
and criminally liable for their employee’s actions. Part IV analyzes cases
where the employee’s right to privacy was at issue and where computer usage
policy statements played a significant role in helping to limit liability. Part V
provides an example of an effective and currently used electronic equipment
policy statement that was created by an employer and given to his or her
employees, along with other suggestions to limit the employer’s liability. Part
1 Jonathan Bick, Respondeat superior applies to online activity; Internet-use policies are
critical to protect employers from employees’ illegal Internet acts, 169 NEW JERSEY L.J. 28
(August 26, 2002).
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
2 See id.
3 Trip Gabriel, New Issue at Work: On-Line Sex Sites, N.Y. TIMES, June 27, 1996, at C1;
see also Erin M. Davis, The Doctrine of Respondeat Superior: An Application to
Employers’ Liability for the Computer or Internet Crimes Committed by Their Employees,
12 ALB. L.J. SCI. & TECH. 683, 697 (2002).
4 See Gabriel, supra note 3; see also Davis, supra note 3.
5 Meritor Savings Bank v. Vinson, 477 U.S. 57, 66 (1986) (holding that an employer
may not need to have actual notice of improper conduct of an employee to be held liable for
the employee’s acts).
6 See Davis, supra note 3; see also Andrews v. City of Philadelphia, 895 F.2d 1469, 1485
9 See Stephanie Dahl, Dangerous E-Mail: Companies are Finding that E-Mail
Indiscretions Can Leave Them Legally Vulnerable, INFORMATION WEEK, Sept. 12, 1994, at
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
her gender, and that the manager sent e-mail messages to her and other
employees that were offensive to women.10 According to the employee, these
messages included innuendo about male genitalia and other sexual
references.11 Usually, the employers’ failure to appropriately control e-mail
usage results in a finding that is against the employer.
Recently, with the emergence and continued growth of electronic
communications, harassment claims by employees based on the transmission
or receipt of inappropriate e-mails have become quite common. Employees
utilizing the e-mail system improperly often allows for the “instantaneous, and
usually thoughtless, dissemination of inappropriate material to broad groups of
people,” while creating potential liability for the employer.12 Because of this
possibility, employers must be able to fully investigate an employee’s use of
his computer in the course of his employment.13 This ability is beneficial to
employers in two distinct ways: first, it allows employers to prevent
harassment within the workplace, and second, it allows employers to properly
defend themselves if they become part of a lawsuit on this matter.14
12.
10 See id.
11 See id.
12 Michael J. Crowley & Christian A. Aviza, Electronic investigations; Do an employer’s
14 See id.
15 Doe v. United States, 912 F. Supp. 193, 194 (holding the employer partly liable
because the employee’s acts were foreseeable and the employer knew or should have known
of the risk posed); see also Davis, supra note 3, at 709.
16 See Davis, supra note 3, at 709.
17 See id.
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
adequate penal and statutory laws” to deal with these new “tech” types of
crimes committed by employees.18 Many recommend that courts should turn
to alternative theories, such as respondeat superior, to find employers
criminally liable.19 This will partially ensure that society will find “appropriate
retribution” and that employers will be “encouraged to take adequate
precautions and measures in monitoring and investigating possible criminal
activity that is occurring in their workplaces.”20
Under the doctrine of respondeat superior, the actions of an employee acting
within the scope of employment are the means of imputing intent and guilty
acts to the employer.21 For an employee’s conduct to fall within the scope of
employment, the conduct must be of the type that “the employee is employed
to perform and that generally occurs during the time of employment.”22 The
Restatement of Agency depicts the traditional test adopted by most
jurisdictions to determine whether an employee’s conduct falls within the
limits of the “scope of employment” providing that:
The conduct of the employee is within the scope of employment if:
1. It is of the kind the employee is employed to perform;
2. It occurs within authorized space and time limits;
3. Some or all of it is done to serve the employer, and;
4. If the employees use force against another.23
The conduct of the employee is said to not be within the scope of
employment if it is “different in kind from that authorized,” beyond the
authorized space or time limits, or “too little activated by a purpose to serve the
master.”24 Additionally, it is beneficial for the employee if the activity in
question meets at least some of the employer’s objectives.
History shows that courts limit the situations when an employer may be
liable for employees’ wrongful acts. They generally hold that acts which are
purely motivated by personal interests or are outrageous in nature are to be
deemed as outside the scope of employment.25 However, courts are willing to
expand employer liability in instances where the employee’s acts only benefit
the employee.26 Therefore, courts have found that an injury may be considered
18 See id.
19 See id. at 709-10.
20 See id.
21 See Bick, supra note 1.
22 See id.
23 See Davis, supra note 3, at 690.
24 RESTATEMENT (SECOND) OF AGENCY § 228 (1957).
25 See Bick, supra note 1.
26 See id.
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
27 Id.
28 See id.
29 See id.
30 See id.
31 See Bick, supra note 1.
32 Id.
33 Iid.
34 See id.
35 See id.
36 See id.
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
37
New York Cent. v. United States, 212 U.S. 481 (1909); see also Bick supra, note 1.
38 See Bick, supra note 1.
39 See id.
40 TBG Ins. Services Co. v. Superior Court of Los Angeles, 96 Cal. App. 4th 443 (Cal.
Ct. App. 2002); see also Crowley & Aviza, supra note 12, at A8.
41 TBG Ins. Services Co., 96 Cal App. 4th at 446.
45 See id.
46 See id.
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
approved.”47 Zieminski also agreed with the statement’s provision that the
computer and/or system cannot be “used for improper, derogatory, defamatory,
obscene or other inappropriate purposes.”48 Additionally, the employee
understood that improperly using the computers could result in disciplinary
action, such as discharge.49
This case’s holding displayed the benefits and necessity of a “well-
structured” computer and electronic media policy for employers.50 Company
policies designed to limit the employee’s right of privacy can be extremely
effective for companies involved in electronic investigations. Additionally,
they are also quite useful in shielding the lawyer from liability.
In Utah, a similar circumstance arose in Autoliv ASP v. Department of
Workforce Services.51 Two employees, Thomas A. King and Christopher
Guzman, were found to have sent sexually harassing and offensive e-mails to a
former employee.52 On numerous occasions, King and Guzman had violated
the employer’s policy against the transmission of sexually oriented and clearly
offensive e-mail messages.53 Eventually, the employees were fired for their
behavior and “improper and unauthorized use of company e-mail.”54 The
employees did not refute the fact that the messages had been sent, but they did
say they were unaware that their actions were against the employer’s policy
and could result in immediate termination.55 One appeals board found that
while King and Guzman were responsible, the element of knowledge was
missing, leaving no just cause for their discharge.56 However, the Court of
Appeals of Utah reversed, holding that the e-mail transmission of sexually
explicit and offensive jokes, pictures, and videos, resulted in a “flagrant
violation of a universal standard of behavior.” As a result, the employees were
discharged for just cause.57
In Garrity v. John Hancock Mutual Life Insurance Co., two employees were
terminated after the employer examined inappropriate sexual e-mails they sent
within the office after doing an investigation based on a harassment
complaint.58 Both of these employees received these inappropriate e-mails
LEXIS 8343, at *1 (Mass. Dist. Ct. 2002); see also Crowley & Aviza, supra note 12.
59 See Crowley & Aviza, supra note 12.
60 See Garrity, No. 00-12143-RWZ, 2002 U.S. Dist. LEXIS 8343, at *3.
61 Id. at *5-6; Crowley & Aviza, supra note 12; Smyth v. Pillsbury Co., 914 F. Supp. 97,
101 (E.D. Pa. 1996) (holding that even in the absence of a company e-mail policy, the
plaintiffs would not have had a reasonable expectation of privacy in their work e-mail to a
supervisor. This is because “once the plaintiff communicated the alleged unprofessional
comments to a second person (his supervisor) over an e-mail system which was apparently
utilized by the entire company, any reasonable expectation of privacy was lost.”).
62 See Garrity, No. 00-12143-RWZ, 2002 U.S. Dist. LEXIS 8343, at *5-6; Crowley &
Aviza, supra note 12; Faragher v. City of Boca Raton, 524 U.S. 775 (1998); Burlington
Indus., Inc. v. Ellerth, 524 U.S. 742 (1998).
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
of which they are aware would likely “trump” any right of privacy in the
terminated employee’s e-mails.65
Another important case, Haybeck v. Prodigy Services, has been the focus of
numerous debates in the area of Internet-related sexual harassment.66 Jacob
Jacks, a computer technical advisor for Prodigy Services Company, repeatedly
entered an online “sex chat room” while at work.67 Jacks’ motive was to
become friends with the plaintiff, Barbara Haybeck, in attempting to entice her
to engage in sexual intercourse with him. Jacks, who had AIDS and a history
of being a “sexual predator,” continuously used the Internet access provided by
the employer to spend excessive amounts of time chatting online with
Haybeck.68 Eventually, Jacks persuaded Haybeck to have sexual intercourse
with him.69 However, at all instances during their initial e-mail
communications and throughout their relationship, Jacks always denied having
AIDS.70 As a result of her relationship with Jacks, Haybeck contracted
AIDS.71 She subsequently filed a lawsuit against Jacks’ employer, Prodigy
services, for its “negligence, carelessness, recklessness and gross
negligence . . . in [Prodigy’s] ownership, operation, management, repair and
control of [its] online network.”72
In this case, the court dismissed Haybeck’s claim against the employer,
Prodigy, under the doctrine of responsdeat superior.73 In its findings, the court
held that an employee’s actions cannot fall within the scope of employment
when such actions are entirely personal in nature.74 Even though the court did
not specifically declare Jacks’ actions outrageous, that his actions were “so out
of the ordinary and appalling that they could not have furthered any
employer’s interest” can easily be inferred.75
Moreover, there are several indications that the employer’s interest was not
being furthered in the Prodigy case. One indicator that Jacks’ was not
furthering Prodigy’s business was his decision not to disclose the fact that he
had AIDS.76 Instead, concealing this information likely arose from a personal
68 See Haybeck, 944 F. Supp., at 328; see also Davis, supra note 3, at 698.
69 See Haybeck, 944 F. Supp., at 328; see also Davis, supra note 3, at 698.
70 See Haybeck, 944 F. Supp., at 328; see also Davis, supra note 3, at 698.
71 See Haybeck, 944 F. Supp., at 328; see also Davis, supra note 3, at 698.
72 See Haybeck, 944 F. Supp., at 328; see also Davis, supra note 3, at 699.
73 See Haybeck, 944 F. Supp., at 329; see also Davis, supra note 3, at 699.
74 See Haybeck, 944 F. Supp., at 329; see also Davis, supra note 3, at 698.
75 See Haybeck, 944 F. Supp., at 331; see also Davis, supra note 3, at 699.
76 See Haybeck, 944 F. Supp., at 330; Davis, supra note 3, at 699; see also
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
motivation of Jacks that was “far removed from the purpose of serving his
employer.”77 Additionally, Jacks use of the Internet as a tool for his personal
satisfaction, did not serve the interest of Prodigy; consequently, it may be
viewed as falling outside the “scope of employment” component of respondeat
superior.78 According to the traditional theory of respondeat superior liability,
employer liability will not be “imposed if the employee commits wrongful acts
that are so outrageous that they fall outside of the scope of employment”
without furthering any of the employer’s interests.79 Therefore, under the
traditional application of “scope of employment,” the court in Prodigy
correctly decided that the employer was not liable.80
80 See Haybeck, 944 F. Supp., at 331; see also Davis, supra note 3, at 699.
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
85 See id.
86 See id.
88 See id.
89 See id.
90 See id.
91 See Davis, supra note 3, at 711; see also Ruth Hill Bro, E-Mail in the Workplace, in
ONLINE LAW: THE SPA’S LEGAL GUIDE TO DOING BUSINESS ON THE INTERNET, at 422
(Thomas J. Smedinghoff ed., 1996)
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
because without this statement the employer will likely not be protected from
liability.92 It is essential that this policy includes a provision stating that “the
employee understands and agrees to follow the organization’s Internet
policy.”93 This policy must be “known by the employees and enforced by the
employer,” so that it will be more likely that the policy can shield the employer
from liability.94 As part of an employer’s Internet access, it is important and
highly recommended that employees be notified that their Internet use will be
governed by the employer policy.95 Moreover, employers wanting to avoid
liability “should take prompt action in the event that they become aware of
illegal or wrongful activities of their employees.”96
An employer can protect itself and minimize the risk of facing liability for
the illegal online acts of their employees through “the formulation,
distribution, and enforcement, of . . . [a company] policy that emphasizes that
all e-mail and computer bulletin board communications are for business
purposes [only] and that sexual harassment and other offensive
communications are strictly prohibited.”97 Additionally, in this policy, the
employer should warn employees that any violations of these standards could
serve as a cause for disciplinary action, including termination of their
employment.98
Creating such Internet and e-mail policies potentially achieves two favorable
outcomes. First, these policies would provide employees with guidance about
appropriate use of the Internet and e-mail systems at their workplace. Second,
these policies would play a significant role in sufficiently protecting the
employer from liability.99
92 See Davis, supra note 3, at 711; Louise Ann Fernandez & Jennifer Rappoport,
Workplace Claims: Beyond Discrimination, in 30th ANNUAL INSTITUTE ON EMPLOYMENT
LAW, 1221, 1230 (Practicing Law Institute, Litig. & Admin. Prac. Course Handbook, Series
No. H0-00AP, Oct. 2001), available in WL 662 PLI/Lit 1221 (discussing how under
proposed legislation employees must be appropriately notified of any electronic
communication monitoring policy); John Araneo, Note, Pandora’s (E-Mail) Box: E-Mail
Monitoring in the Workplace, 14 HOFSTRA LAB L.J. 339, 351 (1996) (stating that case law
establishes a need for “actual proof of notice” of the policy).
93 See Bick, supra note 1, at 29.
94 See id.
95 See id.
96 See id.
97 See Bro, supra note 91, at 419; see also Robert M. Barker et al., E-Mail Issues,
INTERNAL AUDITOR, Aug. 1995, at 60 (describing how simple company e-mail policies will
help in limiting potential legal issues from developing and providing general instructions for
formulating a company e-mail policy).
98 See Davis, supra note 3, at 711.
99 Peter Brown, Policies for Corporate Internet and E-Mail Use, in THIRD ANNUAL
INTERNET LAW INSTITUTE 637, 672 (Practising Law Institute 1999), available in WL 564
COPYRIGHT © 2004 TRUSTEES OF BOSTON UNIVERSITY. THIS VERSION DOES NOT
CONTAIN PARAGRAPH/PAGE REFERENCES. PLEASE CONSULT THE PRINT OR ON-
LINE DATABASE VERSIONS FOR PROPER CITATION INFORMATION
PLI/Pat 637 (discussing that an employer should provide notice to its employees that
communications over the Internet, including e-mails, will not be confidential and could be
monitored); see also Bro, supra note 91, at 421.
100 Laura B. Smith, Electronic Monitoring Raises Legal and Societal Questions, PC
104 See Davis, supra note 3, at 712; Terex Corp. v. UAW Local 1004, No. CIV.A. 2:97
CV243-D-B, 1998 WL 433948, at *7 (N.D. Miss. June 17, 1998) (stating that once an
employer has knowledge of its employee’s wrongful acts, the employer must take prompt
action or face liability).
105 See Davis, supra note 3, at 712.
VI. CONCLUSION
With the growth of computers, the Internet, and e-mail, numerous legal
issues develop for the employer. Since the Internet and e-mail enhance the
opportunities for illegal online activity, employees offering computer and
Internet use within the workplace are potentially liable to the victims who
suffer from their employees’ crimes. Without a doubt, employers need to be
aware and monitor their employee’s online activity, so they can limit their
liability for their employee’s illegal or wrongful conduct. Courts can hold
employers liable under two different theories – respondeat superior and
negligent retention. Under the theory of respondeat superior, a court may hold
an employer liable if it is determined that the employee’s acts were within the
“scope of their employment.”107 Under the theory of negligent retention, the
court can also hold an employer liable if the employer did not take any
remedial measures to stop illegal or wrongful activity when the employer
“knew or should have known” of these problems within the workplace.108
Most importantly, employers need to protect themselves by reducing their
risk of liability for employees’ misuse of computer, Internet, and e-mail
systems in the workplace. To limit their liability, the employer should adopt
strict and defensive Internet and computer use policies and procedures that
prohibit illegal and wrongful computer and online conduct.109 As the Garrity
case in Massachusetts and the TBG Insurance Services Company case in
California prove, it is of the utmost importance to develop and implement a
“well-structured” company policy dealing with the use of computers and
electronic communication systems by employees. This policy must establish
that employees should have “no expectation of privacy in the use of company
computers, e-mail systems or other electronic communication.”110 Creating a
Internet and computer use agreement with the assistance of legal counsel that
clearly outlines what employees are permitted to do and prohibited from doing
on their work computers, along with appropriate adhesion and enforcement
procedures, is essential. Moreover, by creating such an agreement the
employer puts the employee on notice that he should not have any expectation
of privacy in his computer use and that the employer may monitor its
employees’ electronic communication activities. By taking these significant
steps, the employer will protect itself from liability while informing their
employees of acceptable practices within the workplace, and this monitoring
will quite likely allow the employees to increase their productivity while
providing them with a framework for appropriate conduct in their electronic
communications.
DISCLAIMER: This article has been strictly prepared and should be read for educational
purposes only. The authors are not, under any circumstances, providing any type of
professional advice but only raise issues in the workplace. If an individual or entity seeks
assistance in this field they should consult with competent professionals or seek counsel
specializing in this area of expertise. All situations require sound advice and should be
addressed on a case by case basis and the individual state may play a pivotal role
depending on the current state of the law at that juncture. The sample internet liability
agreement cannot be utilized beyond the scope of this article and the authors make no
representation as to its enforceability in any given state.